期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Multimodality Medical Image Fusion Based on Pixel Significance with Edge-Preserving Processing for Clinical Applications
1
作者 Bhawna Goyal Ayush Dogra +4 位作者 Dawa Chyophel Lepcha Rajesh Singh Hemant Sharma Ahmed Alkhayyat Manob Jyoti Saikia 《Computers, Materials & Continua》 SCIE EI 2024年第3期4317-4342,共26页
Multimodal medical image fusion has attained immense popularity in recent years due to its robust technology for clinical diagnosis.It fuses multiple images into a single image to improve the quality of images by reta... Multimodal medical image fusion has attained immense popularity in recent years due to its robust technology for clinical diagnosis.It fuses multiple images into a single image to improve the quality of images by retaining significant information and aiding diagnostic practitioners in diagnosing and treating many diseases.However,recent image fusion techniques have encountered several challenges,including fusion artifacts,algorithm complexity,and high computing costs.To solve these problems,this study presents a novel medical image fusion strategy by combining the benefits of pixel significance with edge-preserving processing to achieve the best fusion performance.First,the method employs a cross-bilateral filter(CBF)that utilizes one image to determine the kernel and the other for filtering,and vice versa,by considering both geometric closeness and the gray-level similarities of neighboring pixels of the images without smoothing edges.The outputs of CBF are then subtracted from the original images to obtain detailed images.It further proposes to use edge-preserving processing that combines linear lowpass filtering with a non-linear technique that enables the selection of relevant regions in detailed images while maintaining structural properties.These regions are selected using morphologically processed linear filter residuals to identify the significant regions with high-amplitude edges and adequate size.The outputs of low-pass filtering are fused with meaningfully restored regions to reconstruct the original shape of the edges.In addition,weight computations are performed using these reconstructed images,and these weights are then fused with the original input images to produce a final fusion result by estimating the strength of horizontal and vertical details.Numerous standard quality evaluation metrics with complementary properties are used for comparison with existing,well-known algorithms objectively to validate the fusion results.Experimental results from the proposed research article exhibit superior performance compared to other competing techniques in the case of both qualitative and quantitative evaluation.In addition,the proposed method advocates less computational complexity and execution time while improving diagnostic computing accuracy.Nevertheless,due to the lower complexity of the fusion algorithm,the efficiency of fusion methods is high in practical applications.The results reveal that the proposed method exceeds the latest state-of-the-art methods in terms of providing detailed information,edge contour,and overall contrast. 展开更多
关键词 Image fusion fractal data analysis BIOMEDICAL DISEASES research multiresolution analysis numerical analysis
下载PDF
Unleashing the Power of Multi-Agent Reinforcement Learning for Algorithmic Trading in the Digital Financial Frontier and Enterprise Information Systems
2
作者 Saket Sarin Sunil K.Singh +4 位作者 Sudhakar Kumar Shivam Goyal Brij Bhooshan Gupta Wadee Alhalabi Varsha Arya 《Computers, Materials & Continua》 SCIE EI 2024年第8期3123-3138,共16页
In the rapidly evolving landscape of today’s digital economy,Financial Technology(Fintech)emerges as a trans-formative force,propelled by the dynamic synergy between Artificial Intelligence(AI)and Algorithmic Trading... In the rapidly evolving landscape of today’s digital economy,Financial Technology(Fintech)emerges as a trans-formative force,propelled by the dynamic synergy between Artificial Intelligence(AI)and Algorithmic Trading.Our in-depth investigation delves into the intricacies of merging Multi-Agent Reinforcement Learning(MARL)and Explainable AI(XAI)within Fintech,aiming to refine Algorithmic Trading strategies.Through meticulous examination,we uncover the nuanced interactions of AI-driven agents as they collaborate and compete within the financial realm,employing sophisticated deep learning techniques to enhance the clarity and adaptability of trading decisions.These AI-infused Fintech platforms harness collective intelligence to unearth trends,mitigate risks,and provide tailored financial guidance,fostering benefits for individuals and enterprises navigating the digital landscape.Our research holds the potential to revolutionize finance,opening doors to fresh avenues for investment and asset management in the digital age.Additionally,our statistical evaluation yields encouraging results,with metrics such as Accuracy=0.85,Precision=0.88,and F1 Score=0.86,reaffirming the efficacy of our approach within Fintech and emphasizing its reliability and innovative prowess. 展开更多
关键词 Neurodynamic Fintech multi-agent reinforcement learning algorithmic trading digital financial frontier
下载PDF
A perspective review on the biosynthesis of plant-based secondary metabolites and their application as potent drugs
3
作者 JHILAM PRAMANIK AKASH KUMAR +7 位作者 SARVESH RUSTAGI MEHAK KATYAL SHEETAL THAKUR JUTISHNA BORA SUMIRA MALIK ANCHAL TREHAN NAYAN TALUKDAR PETR SLAMA 《BIOCELL》 SCIE 2024年第4期541-557,共17页
Many phytochemicals and their derived metabolites produced by plants are extensively employed in commercial goods,pharmaceutical products as well as in the environmental and medicalfields.However,these secondary metabo... Many phytochemicals and their derived metabolites produced by plants are extensively employed in commercial goods,pharmaceutical products as well as in the environmental and medicalfields.However,these secondary metabolites obtained from plants are in low amounts,and it is difficult to synthesize them at the industrial level.Despite these challenges,they may be utilized for a variety of medicinal products that are either available in the market or are being researched and tested.Secondary metabolites are complex compounds that exhibit chirality.Further,under controlled conditions with elicitors,desired secondary metabolites may be produced from plant cell cultures.This review emphasizes the various aspects of secondary metabolites including their types,synthesis,and applications as medicinal products.The article aims to promote the use of plant secondary metabolites in the management and treatment of various diseases. 展开更多
关键词 Secondary metabolites Medicinal plant Synthesis Health benefits
下载PDF
Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems
4
作者 Brij B.Gupta Akshat Gaurav +4 位作者 Varsha Arya Razaz Waheeb Attar Shavi Bansal Ahmed Alhomoud Kwok Tai Chui 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期2165-2183,共19页
Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional ... Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional Encoder Representations from Transformers(BERT)for feature extraction and CNN for classification,specifically designed for enterprise information systems.BERT’s linguistic capabilities are used to extract key features from email content,which are then processed by a convolutional neural network(CNN)model optimized for phishing detection.Achieving an accuracy of 97.5%,our proposed model demonstrates strong proficiency in identifying phishing emails.This approach represents a significant advancement in applying deep learning to cybersecurity,setting a new benchmark for email security by effectively addressing the increasing complexity of phishing attacks. 展开更多
关键词 Phishing BERT convolutional neural networks email security deep learning
下载PDF
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning 被引量:1
5
作者 A.E.M.Eljialy Mohammed Yousuf Uddin Sultan Ahmad 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第4期948-958,共11页
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i... Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected. 展开更多
关键词 random forest feature selection decision tree software-defined network logistic regression intrusion detection system XGB classifier ADABOOST
原文传递
Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol
6
作者 N.Meenakshi Sultan Ahmad +5 位作者 A.V.Prabu J.Nageswara Rao Nashwan Adnan Othman Hikmat A.M.Abdeljaber R.Sekar Jabeen Nazeer 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第4期985-1001,共17页
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human beings.The widespread deployment of wireless micro sensors will make it possible to conduct accurate environme... The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human beings.The widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental monitoring for a use in both civil and military environments.They make use of these data to monitor and keep track of the physical data of the surrounding environment in order to ensure the sustainability of the area.The data have to be picked up by the sensor,and then sent to the sink node where they may be processed.The nodes of the WSNs are powered by batteries,therefore they eventually run out of power.This energy restriction has an effect on the network life span and environmental sustainability.The objective of this study is to further improve the Engroove Leach(EL)protocol’s energy efficiency so that the network can operate for a very long time while consuming the least amount of energy.The lifespan of WSNs is being extended often using clustering and routing strategies.The Meta Inspired Hawks Fragment Optimization(MIHFO)system,which is based on passive clustering,is used in this study to do clustering.The cluster head is chosen based on the nodes’residual energy,distance to neighbors,distance to base station,node degree,and node centrality.Based on distance,residual energy,and node degree,an algorithm known as Heuristic Wing Antfly Optimization(HWAFO)selects the optimum path between the cluster head and Base Station(BS).They examine the number of nodes that are active,their energy consumption,and the number of data packets that the BS receives.The overall experimentation is carried out under the MATLAB environment.From the analysis,it has been discovered that the suggested approach yields noticeably superior outcomes in terms of throughput,packet delivery and drop ratio,and average energy consumption. 展开更多
关键词 wireless sensor networks energy efficient engroove leach protocol meta inspired Hawks fragment optimization heuristic wing antfly optimization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部